@cedarjs/api 0.15.1-next.0 → 0.15.1-next.23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (59) hide show
  1. package/dist/auth/verifiers/base64Sha1Verifier.d.ts +1 -2
  2. package/dist/auth/verifiers/base64Sha1Verifier.d.ts.map +1 -1
  3. package/dist/auth/verifiers/base64Sha1Verifier.js +3 -4
  4. package/dist/auth/verifiers/base64Sha256Verifier.d.ts +1 -2
  5. package/dist/auth/verifiers/base64Sha256Verifier.d.ts.map +1 -1
  6. package/dist/auth/verifiers/base64Sha256Verifier.js +3 -4
  7. package/dist/auth/verifiers/common.d.ts +16 -8
  8. package/dist/auth/verifiers/common.d.ts.map +1 -1
  9. package/dist/auth/verifiers/common.js +8 -8
  10. package/dist/auth/verifiers/index.d.ts.map +1 -1
  11. package/dist/auth/verifiers/index.js +3 -2
  12. package/dist/auth/verifiers/jwtVerifier.d.ts +1 -9
  13. package/dist/auth/verifiers/jwtVerifier.d.ts.map +1 -1
  14. package/dist/auth/verifiers/jwtVerifier.js +2 -4
  15. package/dist/auth/verifiers/secretKeyVerifier.d.ts +1 -4
  16. package/dist/auth/verifiers/secretKeyVerifier.d.ts.map +1 -1
  17. package/dist/auth/verifiers/secretKeyVerifier.js +3 -4
  18. package/dist/auth/verifiers/sha1Verifier.d.ts +1 -9
  19. package/dist/auth/verifiers/sha1Verifier.d.ts.map +1 -1
  20. package/dist/auth/verifiers/sha1Verifier.js +3 -4
  21. package/dist/auth/verifiers/sha256Verifier.d.ts +1 -9
  22. package/dist/auth/verifiers/sha256Verifier.d.ts.map +1 -1
  23. package/dist/auth/verifiers/sha256Verifier.js +3 -4
  24. package/dist/auth/verifiers/skipVerifier.d.ts +1 -3
  25. package/dist/auth/verifiers/skipVerifier.d.ts.map +1 -1
  26. package/dist/auth/verifiers/skipVerifier.js +3 -4
  27. package/dist/auth/verifiers/timestampSchemeVerifier.d.ts +1 -3
  28. package/dist/auth/verifiers/timestampSchemeVerifier.d.ts.map +1 -1
  29. package/dist/auth/verifiers/timestampSchemeVerifier.js +4 -3
  30. package/dist/cjs/auth/verifiers/base64Sha1Verifier.d.ts +1 -2
  31. package/dist/cjs/auth/verifiers/base64Sha1Verifier.d.ts.map +1 -1
  32. package/dist/cjs/auth/verifiers/base64Sha1Verifier.js +4 -4
  33. package/dist/cjs/auth/verifiers/base64Sha256Verifier.d.ts +1 -2
  34. package/dist/cjs/auth/verifiers/base64Sha256Verifier.d.ts.map +1 -1
  35. package/dist/cjs/auth/verifiers/base64Sha256Verifier.js +4 -4
  36. package/dist/cjs/auth/verifiers/common.d.ts +16 -8
  37. package/dist/cjs/auth/verifiers/common.d.ts.map +1 -1
  38. package/dist/cjs/auth/verifiers/common.js +16 -26
  39. package/dist/cjs/auth/verifiers/index.d.ts.map +1 -1
  40. package/dist/cjs/auth/verifiers/index.js +3 -2
  41. package/dist/cjs/auth/verifiers/jwtVerifier.d.ts +1 -9
  42. package/dist/cjs/auth/verifiers/jwtVerifier.d.ts.map +1 -1
  43. package/dist/cjs/auth/verifiers/jwtVerifier.js +2 -4
  44. package/dist/cjs/auth/verifiers/secretKeyVerifier.d.ts +1 -4
  45. package/dist/cjs/auth/verifiers/secretKeyVerifier.d.ts.map +1 -1
  46. package/dist/cjs/auth/verifiers/secretKeyVerifier.js +7 -4
  47. package/dist/cjs/auth/verifiers/sha1Verifier.d.ts +1 -9
  48. package/dist/cjs/auth/verifiers/sha1Verifier.d.ts.map +1 -1
  49. package/dist/cjs/auth/verifiers/sha1Verifier.js +4 -4
  50. package/dist/cjs/auth/verifiers/sha256Verifier.d.ts +1 -9
  51. package/dist/cjs/auth/verifiers/sha256Verifier.d.ts.map +1 -1
  52. package/dist/cjs/auth/verifiers/sha256Verifier.js +4 -4
  53. package/dist/cjs/auth/verifiers/skipVerifier.d.ts +1 -3
  54. package/dist/cjs/auth/verifiers/skipVerifier.d.ts.map +1 -1
  55. package/dist/cjs/auth/verifiers/skipVerifier.js +7 -4
  56. package/dist/cjs/auth/verifiers/timestampSchemeVerifier.d.ts +1 -3
  57. package/dist/cjs/auth/verifiers/timestampSchemeVerifier.d.ts.map +1 -1
  58. package/dist/cjs/auth/verifiers/timestampSchemeVerifier.js +8 -3
  59. package/package.json +3 -4
@@ -14,6 +14,5 @@ export declare const verifySignature: ({ payload, secret, signature, }: {
14
14
  * @see https://docs.svix.com/receiving/verifying-payloads/how-manual
15
15
  * @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
16
16
  */
17
- declare const base64Sha1Verifier: (_options?: VerifyOptions) => Base64Sha1Verifier;
18
- export default base64Sha1Verifier;
17
+ export declare function base64Sha1Verifier(_options?: VerifyOptions): Base64Sha1Verifier;
19
18
  //# sourceMappingURL=base64Sha1Verifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"base64Sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/base64Sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,kBAAmB,SAAQ,eAAe;IACzD,IAAI,EAAE,oBAAoB,CAAA;CAC3B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,QAAA,MAAM,kBAAkB,GAAI,WAAW,aAAa,KAAG,kBAUtD,CAAA;AAED,eAAe,kBAAkB,CAAA"}
1
+ {"version":3,"file":"base64Sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/base64Sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,kBAAmB,SAAQ,eAAe;IACzD,IAAI,EAAE,oBAAoB,CAAA;CAC3B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,wBAAgB,kBAAkB,CAChC,QAAQ,CAAC,EAAE,aAAa,GACvB,kBAAkB,CAUpB"}
@@ -39,7 +39,7 @@ const verifySignature = ({
39
39
  );
40
40
  }
41
41
  };
42
- const base64Sha1Verifier = (_options) => {
42
+ function base64Sha1Verifier(_options) {
43
43
  return {
44
44
  sign: ({ payload, secret }) => {
45
45
  return createSignature({ payload, secret });
@@ -49,9 +49,8 @@ const base64Sha1Verifier = (_options) => {
49
49
  },
50
50
  type: "base64Sha1Verifier"
51
51
  };
52
- };
53
- var base64Sha1Verifier_default = base64Sha1Verifier;
52
+ }
54
53
  export {
55
- base64Sha1Verifier_default as default,
54
+ base64Sha1Verifier,
56
55
  verifySignature
57
56
  };
@@ -14,6 +14,5 @@ export declare const verifySignature: ({ payload, secret, signature, }: {
14
14
  * @see https://docs.svix.com/receiving/verifying-payloads/how-manual
15
15
  * @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
16
16
  */
17
- declare const base64Sha256Verifier: (_options?: VerifyOptions) => Base64Sha256Verifier;
18
- export default base64Sha256Verifier;
17
+ export declare function base64Sha256Verifier(_options?: VerifyOptions): Base64Sha256Verifier;
19
18
  //# sourceMappingURL=base64Sha256Verifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"base64Sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/base64Sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,oBAAqB,SAAQ,eAAe;IAC3D,IAAI,EAAE,sBAAsB,CAAA;CAC7B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,QAAA,MAAM,oBAAoB,GACxB,WAAW,aAAa,KACvB,oBAUF,CAAA;AAED,eAAe,oBAAoB,CAAA"}
1
+ {"version":3,"file":"base64Sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/base64Sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,oBAAqB,SAAQ,eAAe;IAC3D,IAAI,EAAE,sBAAsB,CAAA;CAC7B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,wBAAgB,oBAAoB,CAClC,QAAQ,CAAC,EAAE,aAAa,GACvB,oBAAoB,CAUtB"}
@@ -39,7 +39,7 @@ const verifySignature = ({
39
39
  );
40
40
  }
41
41
  };
42
- const base64Sha256Verifier = (_options) => {
42
+ function base64Sha256Verifier(_options) {
43
43
  return {
44
44
  sign: ({ payload, secret }) => {
45
45
  return createSignature({ payload, secret });
@@ -49,9 +49,8 @@ const base64Sha256Verifier = (_options) => {
49
49
  },
50
50
  type: "base64Sha256Verifier"
51
51
  };
52
- };
53
- var base64Sha256Verifier_default = base64Sha256Verifier;
52
+ }
54
53
  export {
55
- base64Sha256Verifier_default as default,
54
+ base64Sha256Verifier,
56
55
  verifySignature
57
56
  };
@@ -1,20 +1,28 @@
1
+ import { base64Sha1Verifier } from './base64Sha1Verifier.js';
1
2
  import type { Base64Sha1Verifier } from './base64Sha1Verifier.js';
3
+ import { base64Sha256Verifier } from './base64Sha256Verifier.js';
2
4
  import type { Base64Sha256Verifier } from './base64Sha256Verifier.js';
5
+ import { jwtVerifier } from './jwtVerifier.js';
3
6
  import type { JwtVerifier } from './jwtVerifier.js';
7
+ import { secretKeyVerifier } from './secretKeyVerifier.js';
4
8
  import type { SecretKeyVerifier } from './secretKeyVerifier.js';
9
+ import { sha1Verifier } from './sha1Verifier.js';
5
10
  import type { Sha1Verifier } from './sha1Verifier.js';
11
+ import { sha256Verifier } from './sha256Verifier.js';
6
12
  import type { Sha256Verifier } from './sha256Verifier.js';
13
+ import { skipVerifier } from './skipVerifier.js';
7
14
  import type { SkipVerifier } from './skipVerifier.js';
15
+ import { timestampSchemeVerifier } from './timestampSchemeVerifier.js';
8
16
  import type { TimestampSchemeVerifier } from './timestampSchemeVerifier.js';
9
17
  export declare const verifierLookup: {
10
- skipVerifier: (_options?: VerifyOptions) => SkipVerifier;
11
- secretKeyVerifier: (_options?: VerifyOptions) => SecretKeyVerifier;
12
- sha1Verifier: (_options?: VerifyOptions) => Sha1Verifier;
13
- sha256Verifier: (_options?: VerifyOptions) => Sha256Verifier;
14
- base64Sha1Verifier: (_options?: VerifyOptions) => Base64Sha1Verifier;
15
- base64Sha256Verifier: (_options?: VerifyOptions) => Base64Sha256Verifier;
16
- timestampSchemeVerifier: (options?: VerifyOptions) => TimestampSchemeVerifier;
17
- jwtVerifier: (options?: VerifyOptions) => JwtVerifier;
18
+ skipVerifier: typeof skipVerifier;
19
+ secretKeyVerifier: typeof secretKeyVerifier;
20
+ sha1Verifier: typeof sha1Verifier;
21
+ sha256Verifier: typeof sha256Verifier;
22
+ base64Sha1Verifier: typeof base64Sha1Verifier;
23
+ base64Sha256Verifier: typeof base64Sha256Verifier;
24
+ timestampSchemeVerifier: typeof timestampSchemeVerifier;
25
+ jwtVerifier: typeof jwtVerifier;
18
26
  };
19
27
  export type SupportedVerifiers = SkipVerifier | SecretKeyVerifier | Sha1Verifier | Sha256Verifier | Base64Sha1Verifier | Base64Sha256Verifier | TimestampSchemeVerifier | JwtVerifier;
20
28
  export type SupportedVerifierTypes = keyof typeof verifierLookup;
@@ -1 +1 @@
1
- {"version":3,"file":"common.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/common.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AAEjE,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AAErE,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AAEnD,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAE/D,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAErD,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AAEzD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAErD,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AAE3E,eAAO,MAAM,cAAc;;;;;;;;;CAS1B,CAAA;AAED,MAAM,MAAM,kBAAkB,GAC1B,YAAY,GACZ,iBAAiB,GACjB,YAAY,GACZ,cAAc,GACd,kBAAkB,GAClB,oBAAoB,GACpB,uBAAuB,GACvB,WAAW,CAAA;AAEf,MAAM,MAAM,sBAAsB,GAAG,MAAM,OAAO,cAAc,CAAA;AAEhE,eAAO,MAAM,sBAAsB,QAAmC,CAAA;AAEtE,eAAO,MAAM,0BAA0B,mDACW,CAAA;AAElD,eAAO,MAAM,yBAAyB,2BAA2B,CAAA;AAIjE;;GAEG;AACH,eAAO,MAAM,iBAAiB,QAAe,CAAA;AAE7C;;;GAGG;AACH,cAAM,YAAa,SAAQ,KAAK;IAC9B;;;SAGK;gBACO,OAAO,EAAE,MAAM;CAG5B;AAED;;;GAGG;AACH,qBAAa,wBAAyB,SAAQ,YAAY;IACxD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,YAAY;IAChD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAM,WAAW,aAAa;IAC5B,eAAe,CAAC,EAAE,MAAM,CAAA;IACxB,oBAAoB,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,KAAK,MAAM,CAAA;IACpD,wBAAwB,CAAC,EAAE,MAAM,CAAA;IACjC,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,MAAM,CAAC,EAAE,MAAM,CAAA;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B,IAAI,CAAC,EACH,OAAO,EACP,MAAM,GACP,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;KACf,GAAG,MAAM,CAAA;IACV,MAAM,CAAC,EACL,OAAO,EACP,MAAM,EACN,SAAS,GACV,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;QACd,SAAS,EAAE,MAAM,CAAA;KAClB,GAAG,OAAO,GAAG,wBAAwB,CAAA;IACtC,IAAI,EAAE,sBAAsB,CAAA;CAC7B"}
1
+ {"version":3,"file":"common.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/common.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AAC5D,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AACjE,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AAChE,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AACrE,OAAO,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AAC9C,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AACnD,OAAO,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAC1D,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAC/D,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAChD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AACrD,OAAO,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AACpD,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AACzD,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAChD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AACrD,OAAO,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AACtE,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AAE3E,eAAO,MAAM,cAAc;;;;;;;;;CAS1B,CAAA;AAED,MAAM,MAAM,kBAAkB,GAC1B,YAAY,GACZ,iBAAiB,GACjB,YAAY,GACZ,cAAc,GACd,kBAAkB,GAClB,oBAAoB,GACpB,uBAAuB,GACvB,WAAW,CAAA;AAEf,MAAM,MAAM,sBAAsB,GAAG,MAAM,OAAO,cAAc,CAAA;AAEhE,eAAO,MAAM,sBAAsB,QAAmC,CAAA;AAEtE,eAAO,MAAM,0BAA0B,mDACW,CAAA;AAElD,eAAO,MAAM,yBAAyB,2BAA2B,CAAA;AAIjE;;GAEG;AACH,eAAO,MAAM,iBAAiB,QAAe,CAAA;AAE7C;;;GAGG;AACH,cAAM,YAAa,SAAQ,KAAK;IAC9B;;;SAGK;gBACO,OAAO,EAAE,MAAM;CAG5B;AAED;;;GAGG;AACH,qBAAa,wBAAyB,SAAQ,YAAY;IACxD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,YAAY;IAChD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAM,WAAW,aAAa;IAC5B,eAAe,CAAC,EAAE,MAAM,CAAA;IACxB,oBAAoB,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,KAAK,MAAM,CAAA;IACpD,wBAAwB,CAAC,EAAE,MAAM,CAAA;IACjC,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,MAAM,CAAC,EAAE,MAAM,CAAA;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B,IAAI,CAAC,EACH,OAAO,EACP,MAAM,GACP,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;KACf,GAAG,MAAM,CAAA;IACV,MAAM,CAAC,EACL,OAAO,EACP,MAAM,EACN,SAAS,GACV,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;QACd,SAAS,EAAE,MAAM,CAAA;KAClB,GAAG,OAAO,GAAG,wBAAwB,CAAA;IACtC,IAAI,EAAE,sBAAsB,CAAA;CAC7B"}
@@ -1,11 +1,11 @@
1
- import base64Sha1Verifier from "./base64Sha1Verifier.js";
2
- import base64Sha256Verifier from "./base64Sha256Verifier.js";
3
- import jwtVerifier from "./jwtVerifier.js";
4
- import secretKeyVerifier from "./secretKeyVerifier.js";
5
- import sha1Verifier from "./sha1Verifier.js";
6
- import sha256Verifier from "./sha256Verifier.js";
7
- import skipVerifier from "./skipVerifier.js";
8
- import timestampSchemeVerifier from "./timestampSchemeVerifier.js";
1
+ import { base64Sha1Verifier } from "./base64Sha1Verifier.js";
2
+ import { base64Sha256Verifier } from "./base64Sha256Verifier.js";
3
+ import { jwtVerifier } from "./jwtVerifier.js";
4
+ import { secretKeyVerifier } from "./secretKeyVerifier.js";
5
+ import { sha1Verifier } from "./sha1Verifier.js";
6
+ import { sha256Verifier } from "./sha256Verifier.js";
7
+ import { skipVerifier } from "./skipVerifier.js";
8
+ import { timestampSchemeVerifier } from "./timestampSchemeVerifier.js";
9
9
  const verifierLookup = {
10
10
  skipVerifier,
11
11
  secretKeyVerifier,
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/index.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EACV,sBAAsB,EACtB,aAAa,EACb,eAAe,EAChB,MAAM,aAAa,CAAA;AAEpB;;;GAGG;AACH,eAAO,MAAM,cAAc,GACzB,MAAM,sBAAsB,EAC5B,UAAU,aAAa,KACtB,eAMF,CAAA;AAED,cAAc,aAAa,CAAA"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/index.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EACV,sBAAsB,EACtB,aAAa,EACb,eAAe,EAChB,MAAM,aAAa,CAAA;AAEpB;;;GAGG;AACH,eAAO,MAAM,cAAc,GACzB,MAAM,sBAAsB,EAC5B,UAAU,aAAa,KACtB,eAQF,CAAA;AAED,cAAc,aAAa,CAAA"}
@@ -1,9 +1,10 @@
1
1
  import { verifierLookup } from "./common.js";
2
2
  const createVerifier = (type, options) => {
3
+ const verifierFactory = verifierLookup[type];
3
4
  if (options) {
4
- return verifierLookup[type](options);
5
+ return verifierFactory(options);
5
6
  } else {
6
- return verifierLookup[type]();
7
+ return verifierFactory();
7
8
  }
8
9
  };
9
10
  export * from "./common.js";
@@ -2,11 +2,6 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface JwtVerifier extends WebhookVerifier {
3
3
  type: 'jwtVerifier';
4
4
  }
5
- /**
6
- *
7
- * verifySignature
8
- *
9
- */
10
5
  export declare const verifySignature: ({ payload, secret, signature, options, }: {
11
6
  payload: string | Record<string, unknown>;
12
7
  secret: string;
@@ -14,13 +9,10 @@ export declare const verifySignature: ({ payload, secret, signature, options, }:
14
9
  options: VerifyOptions | undefined;
15
10
  }) => boolean;
16
11
  /**
17
- *
18
12
  * JWT Payload Verifier
19
13
  *
20
14
  * Based on Netlify's webhook payload verification
21
15
  * @see: https://docs.netlify.com/site-deploys/notifications/#payload-signature
22
- *
23
16
  */
24
- export declare const jwtVerifier: (options?: VerifyOptions) => JwtVerifier;
25
- export default jwtVerifier;
17
+ export declare function jwtVerifier(options?: VerifyOptions): JwtVerifier;
26
18
  //# sourceMappingURL=jwtVerifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"jwtVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/jwtVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,WAAY,SAAQ,eAAe;IAClD,IAAI,EAAE,aAAa,CAAA;CACpB;AA2BD;;;;GAIG;AACH,eAAO,MAAM,eAAe,GAAI,0CAK7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;IACjB,OAAO,EAAE,aAAa,GAAG,SAAS,CAAA;CACnC,KAAG,OAmBH,CAAA;AAED;;;;;;;GAOG;AACH,eAAO,MAAM,WAAW,GAAI,UAAU,aAAa,KAAG,WAUrD,CAAA;AAED,eAAe,WAAW,CAAA"}
1
+ {"version":3,"file":"jwtVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/jwtVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,WAAY,SAAQ,eAAe;IAClD,IAAI,EAAE,aAAa,CAAA;CACpB;AAsBD,eAAO,MAAM,eAAe,GAAI,0CAK7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;IACjB,OAAO,EAAE,aAAa,GAAG,SAAS,CAAA;CACnC,KAAG,OAmBH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,WAAW,CAAC,OAAO,CAAC,EAAE,aAAa,GAAG,WAAW,CAUhE"}
@@ -36,7 +36,7 @@ const verifySignature = ({
36
36
  throw new WebhookVerificationError();
37
37
  }
38
38
  };
39
- const jwtVerifier = (options) => {
39
+ function jwtVerifier(options) {
40
40
  return {
41
41
  sign: ({ payload, secret }) => {
42
42
  return createSignature({ payload, secret, options });
@@ -46,10 +46,8 @@ const jwtVerifier = (options) => {
46
46
  },
47
47
  type: "jwtVerifier"
48
48
  };
49
- };
50
- var jwtVerifier_default = jwtVerifier;
49
+ }
51
50
  export {
52
- jwtVerifier_default as default,
53
51
  jwtVerifier,
54
52
  verifySignature
55
53
  };
@@ -3,12 +3,9 @@ export interface SecretKeyVerifier extends WebhookVerifier {
3
3
  type: 'secretKeyVerifier';
4
4
  }
5
5
  /**
6
- *
7
6
  * Secret Key Verifier
8
7
  *
9
8
  * Use when the payload is not signed, but rather authorized via a known secret key
10
- *
11
9
  */
12
- declare const secretKeyVerifier: (_options?: VerifyOptions) => SecretKeyVerifier;
13
- export default secretKeyVerifier;
10
+ export declare function secretKeyVerifier(_options?: VerifyOptions): SecretKeyVerifier;
14
11
  //# sourceMappingURL=secretKeyVerifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED;;;;;;GAMG;AACH,QAAA,MAAM,iBAAiB,GAAI,WAAW,aAAa,KAAG,iBAgBrD,CAAA;AAED,eAAe,iBAAiB,CAAA"}
1
+ {"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED;;;;GAIG;AACH,wBAAgB,iBAAiB,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,iBAAiB,CAgB7E"}
@@ -1,5 +1,5 @@
1
1
  import { WebhookVerificationError, DEFAULT_WEBHOOK_SECRET } from "./common.js";
2
- const secretKeyVerifier = (_options) => {
2
+ function secretKeyVerifier(_options) {
3
3
  return {
4
4
  sign: ({ secret }) => {
5
5
  return secret;
@@ -13,8 +13,7 @@ const secretKeyVerifier = (_options) => {
13
13
  },
14
14
  type: "secretKeyVerifier"
15
15
  };
16
- };
17
- var secretKeyVerifier_default = secretKeyVerifier;
16
+ }
18
17
  export {
19
- secretKeyVerifier_default as default
18
+ secretKeyVerifier
20
19
  };
@@ -2,24 +2,16 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface Sha1Verifier extends WebhookVerifier {
3
3
  type: 'sha1Verifier';
4
4
  }
5
- /**
6
- *
7
- * verifySignature
8
- *
9
- */
10
5
  export declare const verifySignature: ({ payload, secret, signature, }: {
11
6
  payload: string | Record<string, unknown>;
12
7
  secret: string;
13
8
  signature: string;
14
9
  }) => boolean;
15
10
  /**
16
- *
17
11
  * SHA1 HMAC Payload Verifier
18
12
  *
19
13
  * Based on Vercel's webhook payload verification
20
14
  * @see https://vercel.com/docs/api#integrations/webhooks/securing-webhooks
21
- *
22
15
  */
23
- declare const sha1Verifier: (_options?: VerifyOptions) => Sha1Verifier;
24
- export default sha1Verifier;
16
+ export declare function sha1Verifier(_options?: VerifyOptions): Sha1Verifier;
25
17
  //# sourceMappingURL=sha1Verifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AAkCD;;;;GAIG;AACH,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;;;GAOG;AACH,QAAA,MAAM,YAAY,GAAI,WAAW,aAAa,KAAG,YAUhD,CAAA;AAED,eAAe,YAAY,CAAA"}
1
+ {"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AA6BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,YAAY,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,YAAY,CAUnE"}
@@ -47,7 +47,7 @@ const verifySignature = ({
47
47
  );
48
48
  }
49
49
  };
50
- const sha1Verifier = (_options) => {
50
+ function sha1Verifier(_options) {
51
51
  return {
52
52
  sign: ({ payload, secret }) => {
53
53
  return createSignature({ payload, secret });
@@ -57,9 +57,8 @@ const sha1Verifier = (_options) => {
57
57
  },
58
58
  type: "sha1Verifier"
59
59
  };
60
- };
61
- var sha1Verifier_default = sha1Verifier;
60
+ }
62
61
  export {
63
- sha1Verifier_default as default,
62
+ sha1Verifier,
64
63
  verifySignature
65
64
  };
@@ -2,24 +2,16 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface Sha256Verifier extends WebhookVerifier {
3
3
  type: 'sha256Verifier';
4
4
  }
5
- /**
6
- *
7
- * verifySignature
8
- *
9
- */
10
5
  export declare const verifySignature: ({ payload, secret, signature, }: {
11
6
  payload: string | Record<string, unknown>;
12
7
  secret: string;
13
8
  signature: string;
14
9
  }) => boolean;
15
10
  /**
16
- *
17
11
  * SHA256 HMAC Payload Verifier
18
12
  *
19
13
  * Based on GitHub's webhook payload verification
20
14
  * @see https://docs.github.com/en/developers/webhooks-and-events/securing-your-webhooks
21
- *
22
15
  */
23
- declare const sha256Verifier: (_options?: VerifyOptions) => Sha256Verifier;
24
- export default sha256Verifier;
16
+ export declare function sha256Verifier(_options?: VerifyOptions): Sha256Verifier;
25
17
  //# sourceMappingURL=sha256Verifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;AAkCD;;;;GAIG;AACH,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;;;GAOG;AACH,QAAA,MAAM,cAAc,GAAI,WAAW,aAAa,KAAG,cAUlD,CAAA;AAED,eAAe,cAAc,CAAA"}
1
+ {"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;AA6BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,cAAc,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,cAAc,CAUvE"}
@@ -47,7 +47,7 @@ const verifySignature = ({
47
47
  );
48
48
  }
49
49
  };
50
- const sha256Verifier = (_options) => {
50
+ function sha256Verifier(_options) {
51
51
  return {
52
52
  sign: ({ payload, secret }) => {
53
53
  return createSignature({ payload, secret });
@@ -57,9 +57,8 @@ const sha256Verifier = (_options) => {
57
57
  },
58
58
  type: "sha256Verifier"
59
59
  };
60
- };
61
- var sha256Verifier_default = sha256Verifier;
60
+ }
62
61
  export {
63
- sha256Verifier_default as default,
62
+ sha256Verifier,
64
63
  verifySignature
65
64
  };
@@ -6,8 +6,6 @@ export interface SkipVerifier extends WebhookVerifier {
6
6
  * skipVerifier skips webhook signature verification.
7
7
  * Use when there is no signature provided or the webhook is
8
8
  * entirely public.
9
- *
10
9
  */
11
- declare const skipVerifier: (_options?: VerifyOptions) => SkipVerifier;
12
- export default skipVerifier;
10
+ export declare function skipVerifier(_options?: VerifyOptions): SkipVerifier;
13
11
  //# sourceMappingURL=skipVerifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AACD;;;;;GAKG;AACH,QAAA,MAAM,YAAY,GAAI,WAAW,aAAa,KAAG,YAYhD,CAAA;AAED,eAAe,YAAY,CAAA"}
1
+ {"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AAED;;;;GAIG;AACH,wBAAgB,YAAY,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,YAAY,CAYnE"}
@@ -1,4 +1,4 @@
1
- const skipVerifier = (_options) => {
1
+ function skipVerifier(_options) {
2
2
  return {
3
3
  sign: () => {
4
4
  console.warn(`No signature is created for the skipVerifier verifier`);
@@ -10,8 +10,7 @@ const skipVerifier = (_options) => {
10
10
  },
11
11
  type: "skipVerifier"
12
12
  };
13
- };
14
- var skipVerifier_default = skipVerifier;
13
+ }
15
14
  export {
16
- skipVerifier_default as default
15
+ skipVerifier
17
16
  };
@@ -3,14 +3,12 @@ export interface TimestampSchemeVerifier extends WebhookVerifier {
3
3
  type: 'timestampSchemeVerifier';
4
4
  }
5
5
  /**
6
- *
7
6
  * Timestamp & Scheme Verifier
8
7
  *
9
8
  * Based on Stripe's secure webhook implementation
10
9
  *
11
10
  * @see https://stripe.com/docs/webhooks/signatures
12
- *
13
11
  */
14
- declare const timestampSchemeVerifier: (options?: VerifyOptions) => TimestampSchemeVerifier;
12
+ export declare function timestampSchemeVerifier(options?: VerifyOptions): TimestampSchemeVerifier;
15
13
  export default timestampSchemeVerifier;
16
14
  //# sourceMappingURL=timestampSchemeVerifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD;;;;;;;;GAQG;AACH,QAAA,MAAM,uBAAuB,GAC3B,UAAU,aAAa,KACtB,uBAcF,CAAA;AAED,eAAe,uBAAuB,CAAA"}
1
+ {"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD;;;;;;GAMG;AACH,wBAAgB,uBAAuB,CACrC,OAAO,CAAC,EAAE,aAAa,GACtB,uBAAuB,CAczB;AAED,eAAe,uBAAuB,CAAA"}
@@ -44,7 +44,7 @@ const verifySignature = ({
44
44
  }
45
45
  throw new WebhookVerificationError();
46
46
  };
47
- const timestampSchemeVerifier = (options) => {
47
+ function timestampSchemeVerifier(options) {
48
48
  return {
49
49
  sign: ({ payload, secret }) => {
50
50
  return createSignature({
@@ -58,8 +58,9 @@ const timestampSchemeVerifier = (options) => {
58
58
  },
59
59
  type: "timestampSchemeVerifier"
60
60
  };
61
- };
61
+ }
62
62
  var timestampSchemeVerifier_default = timestampSchemeVerifier;
63
63
  export {
64
- timestampSchemeVerifier_default as default
64
+ timestampSchemeVerifier_default as default,
65
+ timestampSchemeVerifier
65
66
  };
@@ -14,6 +14,5 @@ export declare const verifySignature: ({ payload, secret, signature, }: {
14
14
  * @see https://docs.svix.com/receiving/verifying-payloads/how-manual
15
15
  * @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
16
16
  */
17
- declare const base64Sha1Verifier: (_options?: VerifyOptions) => Base64Sha1Verifier;
18
- export default base64Sha1Verifier;
17
+ export declare function base64Sha1Verifier(_options?: VerifyOptions): Base64Sha1Verifier;
19
18
  //# sourceMappingURL=base64Sha1Verifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"base64Sha1Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,kBAAmB,SAAQ,eAAe;IACzD,IAAI,EAAE,oBAAoB,CAAA;CAC3B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,QAAA,MAAM,kBAAkB,GAAI,WAAW,aAAa,KAAG,kBAUtD,CAAA;AAED,eAAe,kBAAkB,CAAA"}
1
+ {"version":3,"file":"base64Sha1Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,kBAAmB,SAAQ,eAAe;IACzD,IAAI,EAAE,oBAAoB,CAAA;CAC3B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,wBAAgB,kBAAkB,CAChC,QAAQ,CAAC,EAAE,aAAa,GACvB,kBAAkB,CAUpB"}
@@ -18,7 +18,7 @@ var __copyProps = (to, from, except, desc) => {
18
18
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
19
  var base64Sha1Verifier_exports = {};
20
20
  __export(base64Sha1Verifier_exports, {
21
- default: () => base64Sha1Verifier_default,
21
+ base64Sha1Verifier: () => base64Sha1Verifier,
22
22
  verifySignature: () => verifySignature
23
23
  });
24
24
  module.exports = __toCommonJS(base64Sha1Verifier_exports);
@@ -59,7 +59,7 @@ const verifySignature = ({
59
59
  );
60
60
  }
61
61
  };
62
- const base64Sha1Verifier = (_options) => {
62
+ function base64Sha1Verifier(_options) {
63
63
  return {
64
64
  sign: ({ payload, secret }) => {
65
65
  return createSignature({ payload, secret });
@@ -69,9 +69,9 @@ const base64Sha1Verifier = (_options) => {
69
69
  },
70
70
  type: "base64Sha1Verifier"
71
71
  };
72
- };
73
- var base64Sha1Verifier_default = base64Sha1Verifier;
72
+ }
74
73
  // Annotate the CommonJS export names for ESM import in node:
75
74
  0 && (module.exports = {
75
+ base64Sha1Verifier,
76
76
  verifySignature
77
77
  });
@@ -14,6 +14,5 @@ export declare const verifySignature: ({ payload, secret, signature, }: {
14
14
  * @see https://docs.svix.com/receiving/verifying-payloads/how-manual
15
15
  * @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
16
16
  */
17
- declare const base64Sha256Verifier: (_options?: VerifyOptions) => Base64Sha256Verifier;
18
- export default base64Sha256Verifier;
17
+ export declare function base64Sha256Verifier(_options?: VerifyOptions): Base64Sha256Verifier;
19
18
  //# sourceMappingURL=base64Sha256Verifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"base64Sha256Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,oBAAqB,SAAQ,eAAe;IAC3D,IAAI,EAAE,sBAAsB,CAAA;CAC7B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,QAAA,MAAM,oBAAoB,GACxB,WAAW,aAAa,KACvB,oBAUF,CAAA;AAED,eAAe,oBAAoB,CAAA"}
1
+ {"version":3,"file":"base64Sha256Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,oBAAqB,SAAQ,eAAe;IAC3D,IAAI,EAAE,sBAAsB,CAAA;CAC7B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,wBAAgB,oBAAoB,CAClC,QAAQ,CAAC,EAAE,aAAa,GACvB,oBAAoB,CAUtB"}
@@ -18,7 +18,7 @@ var __copyProps = (to, from, except, desc) => {
18
18
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
19
  var base64Sha256Verifier_exports = {};
20
20
  __export(base64Sha256Verifier_exports, {
21
- default: () => base64Sha256Verifier_default,
21
+ base64Sha256Verifier: () => base64Sha256Verifier,
22
22
  verifySignature: () => verifySignature
23
23
  });
24
24
  module.exports = __toCommonJS(base64Sha256Verifier_exports);
@@ -59,7 +59,7 @@ const verifySignature = ({
59
59
  );
60
60
  }
61
61
  };
62
- const base64Sha256Verifier = (_options) => {
62
+ function base64Sha256Verifier(_options) {
63
63
  return {
64
64
  sign: ({ payload, secret }) => {
65
65
  return createSignature({ payload, secret });
@@ -69,9 +69,9 @@ const base64Sha256Verifier = (_options) => {
69
69
  },
70
70
  type: "base64Sha256Verifier"
71
71
  };
72
- };
73
- var base64Sha256Verifier_default = base64Sha256Verifier;
72
+ }
74
73
  // Annotate the CommonJS export names for ESM import in node:
75
74
  0 && (module.exports = {
75
+ base64Sha256Verifier,
76
76
  verifySignature
77
77
  });
@@ -1,20 +1,28 @@
1
+ import { base64Sha1Verifier } from './base64Sha1Verifier.js';
1
2
  import type { Base64Sha1Verifier } from './base64Sha1Verifier.js';
3
+ import { base64Sha256Verifier } from './base64Sha256Verifier.js';
2
4
  import type { Base64Sha256Verifier } from './base64Sha256Verifier.js';
5
+ import { jwtVerifier } from './jwtVerifier.js';
3
6
  import type { JwtVerifier } from './jwtVerifier.js';
7
+ import { secretKeyVerifier } from './secretKeyVerifier.js';
4
8
  import type { SecretKeyVerifier } from './secretKeyVerifier.js';
9
+ import { sha1Verifier } from './sha1Verifier.js';
5
10
  import type { Sha1Verifier } from './sha1Verifier.js';
11
+ import { sha256Verifier } from './sha256Verifier.js';
6
12
  import type { Sha256Verifier } from './sha256Verifier.js';
13
+ import { skipVerifier } from './skipVerifier.js';
7
14
  import type { SkipVerifier } from './skipVerifier.js';
15
+ import { timestampSchemeVerifier } from './timestampSchemeVerifier.js';
8
16
  import type { TimestampSchemeVerifier } from './timestampSchemeVerifier.js';
9
17
  export declare const verifierLookup: {
10
- skipVerifier: (_options?: VerifyOptions) => SkipVerifier;
11
- secretKeyVerifier: (_options?: VerifyOptions) => SecretKeyVerifier;
12
- sha1Verifier: (_options?: VerifyOptions) => Sha1Verifier;
13
- sha256Verifier: (_options?: VerifyOptions) => Sha256Verifier;
14
- base64Sha1Verifier: (_options?: VerifyOptions) => Base64Sha1Verifier;
15
- base64Sha256Verifier: (_options?: VerifyOptions) => Base64Sha256Verifier;
16
- timestampSchemeVerifier: (options?: VerifyOptions) => TimestampSchemeVerifier;
17
- jwtVerifier: (options?: VerifyOptions) => JwtVerifier;
18
+ skipVerifier: typeof skipVerifier;
19
+ secretKeyVerifier: typeof secretKeyVerifier;
20
+ sha1Verifier: typeof sha1Verifier;
21
+ sha256Verifier: typeof sha256Verifier;
22
+ base64Sha1Verifier: typeof base64Sha1Verifier;
23
+ base64Sha256Verifier: typeof base64Sha256Verifier;
24
+ timestampSchemeVerifier: typeof timestampSchemeVerifier;
25
+ jwtVerifier: typeof jwtVerifier;
18
26
  };
19
27
  export type SupportedVerifiers = SkipVerifier | SecretKeyVerifier | Sha1Verifier | Sha256Verifier | Base64Sha1Verifier | Base64Sha256Verifier | TimestampSchemeVerifier | JwtVerifier;
20
28
  export type SupportedVerifierTypes = keyof typeof verifierLookup;
@@ -1 +1 @@
1
- {"version":3,"file":"common.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/common.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AAEjE,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AAErE,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AAEnD,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAE/D,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAErD,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AAEzD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAErD,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AAE3E,eAAO,MAAM,cAAc;;;;;;;;;CAS1B,CAAA;AAED,MAAM,MAAM,kBAAkB,GAC1B,YAAY,GACZ,iBAAiB,GACjB,YAAY,GACZ,cAAc,GACd,kBAAkB,GAClB,oBAAoB,GACpB,uBAAuB,GACvB,WAAW,CAAA;AAEf,MAAM,MAAM,sBAAsB,GAAG,MAAM,OAAO,cAAc,CAAA;AAEhE,eAAO,MAAM,sBAAsB,QAAmC,CAAA;AAEtE,eAAO,MAAM,0BAA0B,mDACW,CAAA;AAElD,eAAO,MAAM,yBAAyB,2BAA2B,CAAA;AAIjE;;GAEG;AACH,eAAO,MAAM,iBAAiB,QAAe,CAAA;AAE7C;;;GAGG;AACH,cAAM,YAAa,SAAQ,KAAK;IAC9B;;;SAGK;gBACO,OAAO,EAAE,MAAM;CAG5B;AAED;;;GAGG;AACH,qBAAa,wBAAyB,SAAQ,YAAY;IACxD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,YAAY;IAChD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAM,WAAW,aAAa;IAC5B,eAAe,CAAC,EAAE,MAAM,CAAA;IACxB,oBAAoB,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,KAAK,MAAM,CAAA;IACpD,wBAAwB,CAAC,EAAE,MAAM,CAAA;IACjC,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,MAAM,CAAC,EAAE,MAAM,CAAA;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B,IAAI,CAAC,EACH,OAAO,EACP,MAAM,GACP,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;KACf,GAAG,MAAM,CAAA;IACV,MAAM,CAAC,EACL,OAAO,EACP,MAAM,EACN,SAAS,GACV,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;QACd,SAAS,EAAE,MAAM,CAAA;KAClB,GAAG,OAAO,GAAG,wBAAwB,CAAA;IACtC,IAAI,EAAE,sBAAsB,CAAA;CAC7B"}
1
+ {"version":3,"file":"common.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/common.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AAC5D,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AACjE,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AAChE,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AACrE,OAAO,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AAC9C,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AACnD,OAAO,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAC1D,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAC/D,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAChD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AACrD,OAAO,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AACpD,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AACzD,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAChD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AACrD,OAAO,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AACtE,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AAE3E,eAAO,MAAM,cAAc;;;;;;;;;CAS1B,CAAA;AAED,MAAM,MAAM,kBAAkB,GAC1B,YAAY,GACZ,iBAAiB,GACjB,YAAY,GACZ,cAAc,GACd,kBAAkB,GAClB,oBAAoB,GACpB,uBAAuB,GACvB,WAAW,CAAA;AAEf,MAAM,MAAM,sBAAsB,GAAG,MAAM,OAAO,cAAc,CAAA;AAEhE,eAAO,MAAM,sBAAsB,QAAmC,CAAA;AAEtE,eAAO,MAAM,0BAA0B,mDACW,CAAA;AAElD,eAAO,MAAM,yBAAyB,2BAA2B,CAAA;AAIjE;;GAEG;AACH,eAAO,MAAM,iBAAiB,QAAe,CAAA;AAE7C;;;GAGG;AACH,cAAM,YAAa,SAAQ,KAAK;IAC9B;;;SAGK;gBACO,OAAO,EAAE,MAAM;CAG5B;AAED;;;GAGG;AACH,qBAAa,wBAAyB,SAAQ,YAAY;IACxD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,YAAY;IAChD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAM,WAAW,aAAa;IAC5B,eAAe,CAAC,EAAE,MAAM,CAAA;IACxB,oBAAoB,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,KAAK,MAAM,CAAA;IACpD,wBAAwB,CAAC,EAAE,MAAM,CAAA;IACjC,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,MAAM,CAAC,EAAE,MAAM,CAAA;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B,IAAI,CAAC,EACH,OAAO,EACP,MAAM,GACP,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;KACf,GAAG,MAAM,CAAA;IACV,MAAM,CAAC,EACL,OAAO,EACP,MAAM,EACN,SAAS,GACV,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;QACd,SAAS,EAAE,MAAM,CAAA;KAClB,GAAG,OAAO,GAAG,wBAAwB,CAAA;IACtC,IAAI,EAAE,sBAAsB,CAAA;CAC7B"}
@@ -1,9 +1,7 @@
1
1
  "use strict";
2
- var __create = Object.create;
3
2
  var __defProp = Object.defineProperty;
4
3
  var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
4
  var __getOwnPropNames = Object.getOwnPropertyNames;
6
- var __getProtoOf = Object.getPrototypeOf;
7
5
  var __hasOwnProp = Object.prototype.hasOwnProperty;
8
6
  var __export = (target, all) => {
9
7
  for (var name in all)
@@ -17,14 +15,6 @@ var __copyProps = (to, from, except, desc) => {
17
15
  }
18
16
  return to;
19
17
  };
20
- var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
21
- // If the importer is in node compatibility mode or this is not an ESM
22
- // file that has been converted to a CommonJS file using a Babel-
23
- // compatible transform (i.e. "__esModule" has not been set), then set
24
- // "default" to the CommonJS "module.exports" for node compatibility.
25
- isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
26
- mod
27
- ));
28
18
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
29
19
  var common_exports = {};
30
20
  __export(common_exports, {
@@ -37,23 +27,23 @@ __export(common_exports, {
37
27
  verifierLookup: () => verifierLookup
38
28
  });
39
29
  module.exports = __toCommonJS(common_exports);
40
- var import_base64Sha1Verifier = __toESM(require("./base64Sha1Verifier.js"), 1);
41
- var import_base64Sha256Verifier = __toESM(require("./base64Sha256Verifier.js"), 1);
42
- var import_jwtVerifier = __toESM(require("./jwtVerifier.js"), 1);
43
- var import_secretKeyVerifier = __toESM(require("./secretKeyVerifier.js"), 1);
44
- var import_sha1Verifier = __toESM(require("./sha1Verifier.js"), 1);
45
- var import_sha256Verifier = __toESM(require("./sha256Verifier.js"), 1);
46
- var import_skipVerifier = __toESM(require("./skipVerifier.js"), 1);
47
- var import_timestampSchemeVerifier = __toESM(require("./timestampSchemeVerifier.js"), 1);
30
+ var import_base64Sha1Verifier = require("./base64Sha1Verifier.js");
31
+ var import_base64Sha256Verifier = require("./base64Sha256Verifier.js");
32
+ var import_jwtVerifier = require("./jwtVerifier.js");
33
+ var import_secretKeyVerifier = require("./secretKeyVerifier.js");
34
+ var import_sha1Verifier = require("./sha1Verifier.js");
35
+ var import_sha256Verifier = require("./sha256Verifier.js");
36
+ var import_skipVerifier = require("./skipVerifier.js");
37
+ var import_timestampSchemeVerifier = require("./timestampSchemeVerifier.js");
48
38
  const verifierLookup = {
49
- skipVerifier: import_skipVerifier.default,
50
- secretKeyVerifier: import_secretKeyVerifier.default,
51
- sha1Verifier: import_sha1Verifier.default,
52
- sha256Verifier: import_sha256Verifier.default,
53
- base64Sha1Verifier: import_base64Sha1Verifier.default,
54
- base64Sha256Verifier: import_base64Sha256Verifier.default,
55
- timestampSchemeVerifier: import_timestampSchemeVerifier.default,
56
- jwtVerifier: import_jwtVerifier.default
39
+ skipVerifier: import_skipVerifier.skipVerifier,
40
+ secretKeyVerifier: import_secretKeyVerifier.secretKeyVerifier,
41
+ sha1Verifier: import_sha1Verifier.sha1Verifier,
42
+ sha256Verifier: import_sha256Verifier.sha256Verifier,
43
+ base64Sha1Verifier: import_base64Sha1Verifier.base64Sha1Verifier,
44
+ base64Sha256Verifier: import_base64Sha256Verifier.base64Sha256Verifier,
45
+ timestampSchemeVerifier: import_timestampSchemeVerifier.timestampSchemeVerifier,
46
+ jwtVerifier: import_jwtVerifier.jwtVerifier
57
47
  };
58
48
  const DEFAULT_WEBHOOK_SECRET = process.env.WEBHOOK_SECRET ?? "";
59
49
  const VERIFICATION_ERROR_MESSAGE = "You don't have access to invoke this function.";
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/index.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EACV,sBAAsB,EACtB,aAAa,EACb,eAAe,EAChB,MAAM,aAAa,CAAA;AAEpB;;;GAGG;AACH,eAAO,MAAM,cAAc,GACzB,MAAM,sBAAsB,EAC5B,UAAU,aAAa,KACtB,eAMF,CAAA;AAED,cAAc,aAAa,CAAA"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/index.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EACV,sBAAsB,EACtB,aAAa,EACb,eAAe,EAChB,MAAM,aAAa,CAAA;AAEpB;;;GAGG;AACH,eAAO,MAAM,cAAc,GACzB,MAAM,sBAAsB,EAC5B,UAAU,aAAa,KACtB,eAQF,CAAA;AAED,cAAc,aAAa,CAAA"}
@@ -25,10 +25,11 @@ module.exports = __toCommonJS(verifiers_exports);
25
25
  var import_common = require("./common.js");
26
26
  __reExport(verifiers_exports, require("./common.js"), module.exports);
27
27
  const createVerifier = (type, options) => {
28
+ const verifierFactory = import_common.verifierLookup[type];
28
29
  if (options) {
29
- return import_common.verifierLookup[type](options);
30
+ return verifierFactory(options);
30
31
  } else {
31
- return import_common.verifierLookup[type]();
32
+ return verifierFactory();
32
33
  }
33
34
  };
34
35
  // Annotate the CommonJS export names for ESM import in node:
@@ -2,11 +2,6 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface JwtVerifier extends WebhookVerifier {
3
3
  type: 'jwtVerifier';
4
4
  }
5
- /**
6
- *
7
- * verifySignature
8
- *
9
- */
10
5
  export declare const verifySignature: ({ payload, secret, signature, options, }: {
11
6
  payload: string | Record<string, unknown>;
12
7
  secret: string;
@@ -14,13 +9,10 @@ export declare const verifySignature: ({ payload, secret, signature, options, }:
14
9
  options: VerifyOptions | undefined;
15
10
  }) => boolean;
16
11
  /**
17
- *
18
12
  * JWT Payload Verifier
19
13
  *
20
14
  * Based on Netlify's webhook payload verification
21
15
  * @see: https://docs.netlify.com/site-deploys/notifications/#payload-signature
22
- *
23
16
  */
24
- export declare const jwtVerifier: (options?: VerifyOptions) => JwtVerifier;
25
- export default jwtVerifier;
17
+ export declare function jwtVerifier(options?: VerifyOptions): JwtVerifier;
26
18
  //# sourceMappingURL=jwtVerifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"jwtVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/jwtVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,WAAY,SAAQ,eAAe;IAClD,IAAI,EAAE,aAAa,CAAA;CACpB;AA2BD;;;;GAIG;AACH,eAAO,MAAM,eAAe,GAAI,0CAK7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;IACjB,OAAO,EAAE,aAAa,GAAG,SAAS,CAAA;CACnC,KAAG,OAmBH,CAAA;AAED;;;;;;;GAOG;AACH,eAAO,MAAM,WAAW,GAAI,UAAU,aAAa,KAAG,WAUrD,CAAA;AAED,eAAe,WAAW,CAAA"}
1
+ {"version":3,"file":"jwtVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/jwtVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,WAAY,SAAQ,eAAe;IAClD,IAAI,EAAE,aAAa,CAAA;CACpB;AAsBD,eAAO,MAAM,eAAe,GAAI,0CAK7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;IACjB,OAAO,EAAE,aAAa,GAAG,SAAS,CAAA;CACnC,KAAG,OAmBH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,WAAW,CAAC,OAAO,CAAC,EAAE,aAAa,GAAG,WAAW,CAUhE"}
@@ -28,7 +28,6 @@ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__ge
28
28
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
29
29
  var jwtVerifier_exports = {};
30
30
  __export(jwtVerifier_exports, {
31
- default: () => jwtVerifier_default,
32
31
  jwtVerifier: () => jwtVerifier,
33
32
  verifySignature: () => verifySignature
34
33
  });
@@ -67,7 +66,7 @@ const verifySignature = ({
67
66
  throw new import_common.WebhookVerificationError();
68
67
  }
69
68
  };
70
- const jwtVerifier = (options) => {
69
+ function jwtVerifier(options) {
71
70
  return {
72
71
  sign: ({ payload, secret }) => {
73
72
  return createSignature({ payload, secret, options });
@@ -77,8 +76,7 @@ const jwtVerifier = (options) => {
77
76
  },
78
77
  type: "jwtVerifier"
79
78
  };
80
- };
81
- var jwtVerifier_default = jwtVerifier;
79
+ }
82
80
  // Annotate the CommonJS export names for ESM import in node:
83
81
  0 && (module.exports = {
84
82
  jwtVerifier,
@@ -3,12 +3,9 @@ export interface SecretKeyVerifier extends WebhookVerifier {
3
3
  type: 'secretKeyVerifier';
4
4
  }
5
5
  /**
6
- *
7
6
  * Secret Key Verifier
8
7
  *
9
8
  * Use when the payload is not signed, but rather authorized via a known secret key
10
- *
11
9
  */
12
- declare const secretKeyVerifier: (_options?: VerifyOptions) => SecretKeyVerifier;
13
- export default secretKeyVerifier;
10
+ export declare function secretKeyVerifier(_options?: VerifyOptions): SecretKeyVerifier;
14
11
  //# sourceMappingURL=secretKeyVerifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED;;;;;;GAMG;AACH,QAAA,MAAM,iBAAiB,GAAI,WAAW,aAAa,KAAG,iBAgBrD,CAAA;AAED,eAAe,iBAAiB,CAAA"}
1
+ {"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED;;;;GAIG;AACH,wBAAgB,iBAAiB,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,iBAAiB,CAgB7E"}
@@ -18,11 +18,11 @@ var __copyProps = (to, from, except, desc) => {
18
18
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
19
  var secretKeyVerifier_exports = {};
20
20
  __export(secretKeyVerifier_exports, {
21
- default: () => secretKeyVerifier_default
21
+ secretKeyVerifier: () => secretKeyVerifier
22
22
  });
23
23
  module.exports = __toCommonJS(secretKeyVerifier_exports);
24
24
  var import_common = require("./common.js");
25
- const secretKeyVerifier = (_options) => {
25
+ function secretKeyVerifier(_options) {
26
26
  return {
27
27
  sign: ({ secret }) => {
28
28
  return secret;
@@ -36,5 +36,8 @@ const secretKeyVerifier = (_options) => {
36
36
  },
37
37
  type: "secretKeyVerifier"
38
38
  };
39
- };
40
- var secretKeyVerifier_default = secretKeyVerifier;
39
+ }
40
+ // Annotate the CommonJS export names for ESM import in node:
41
+ 0 && (module.exports = {
42
+ secretKeyVerifier
43
+ });
@@ -2,24 +2,16 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface Sha1Verifier extends WebhookVerifier {
3
3
  type: 'sha1Verifier';
4
4
  }
5
- /**
6
- *
7
- * verifySignature
8
- *
9
- */
10
5
  export declare const verifySignature: ({ payload, secret, signature, }: {
11
6
  payload: string | Record<string, unknown>;
12
7
  secret: string;
13
8
  signature: string;
14
9
  }) => boolean;
15
10
  /**
16
- *
17
11
  * SHA1 HMAC Payload Verifier
18
12
  *
19
13
  * Based on Vercel's webhook payload verification
20
14
  * @see https://vercel.com/docs/api#integrations/webhooks/securing-webhooks
21
- *
22
15
  */
23
- declare const sha1Verifier: (_options?: VerifyOptions) => Sha1Verifier;
24
- export default sha1Verifier;
16
+ export declare function sha1Verifier(_options?: VerifyOptions): Sha1Verifier;
25
17
  //# sourceMappingURL=sha1Verifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AAkCD;;;;GAIG;AACH,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;;;GAOG;AACH,QAAA,MAAM,YAAY,GAAI,WAAW,aAAa,KAAG,YAUhD,CAAA;AAED,eAAe,YAAY,CAAA"}
1
+ {"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AA6BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,YAAY,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,YAAY,CAUnE"}
@@ -18,7 +18,7 @@ var __copyProps = (to, from, except, desc) => {
18
18
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
19
  var sha1Verifier_exports = {};
20
20
  __export(sha1Verifier_exports, {
21
- default: () => sha1Verifier_default,
21
+ sha1Verifier: () => sha1Verifier,
22
22
  verifySignature: () => verifySignature
23
23
  });
24
24
  module.exports = __toCommonJS(sha1Verifier_exports);
@@ -67,7 +67,7 @@ const verifySignature = ({
67
67
  );
68
68
  }
69
69
  };
70
- const sha1Verifier = (_options) => {
70
+ function sha1Verifier(_options) {
71
71
  return {
72
72
  sign: ({ payload, secret }) => {
73
73
  return createSignature({ payload, secret });
@@ -77,9 +77,9 @@ const sha1Verifier = (_options) => {
77
77
  },
78
78
  type: "sha1Verifier"
79
79
  };
80
- };
81
- var sha1Verifier_default = sha1Verifier;
80
+ }
82
81
  // Annotate the CommonJS export names for ESM import in node:
83
82
  0 && (module.exports = {
83
+ sha1Verifier,
84
84
  verifySignature
85
85
  });
@@ -2,24 +2,16 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
2
  export interface Sha256Verifier extends WebhookVerifier {
3
3
  type: 'sha256Verifier';
4
4
  }
5
- /**
6
- *
7
- * verifySignature
8
- *
9
- */
10
5
  export declare const verifySignature: ({ payload, secret, signature, }: {
11
6
  payload: string | Record<string, unknown>;
12
7
  secret: string;
13
8
  signature: string;
14
9
  }) => boolean;
15
10
  /**
16
- *
17
11
  * SHA256 HMAC Payload Verifier
18
12
  *
19
13
  * Based on GitHub's webhook payload verification
20
14
  * @see https://docs.github.com/en/developers/webhooks-and-events/securing-your-webhooks
21
- *
22
15
  */
23
- declare const sha256Verifier: (_options?: VerifyOptions) => Sha256Verifier;
24
- export default sha256Verifier;
16
+ export declare function sha256Verifier(_options?: VerifyOptions): Sha256Verifier;
25
17
  //# sourceMappingURL=sha256Verifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;AAkCD;;;;GAIG;AACH,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;;;GAOG;AACH,QAAA,MAAM,cAAc,GAAI,WAAW,aAAa,KAAG,cAUlD,CAAA;AAED,eAAe,cAAc,CAAA"}
1
+ {"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;AA6BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,cAAc,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,cAAc,CAUvE"}
@@ -18,7 +18,7 @@ var __copyProps = (to, from, except, desc) => {
18
18
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
19
  var sha256Verifier_exports = {};
20
20
  __export(sha256Verifier_exports, {
21
- default: () => sha256Verifier_default,
21
+ sha256Verifier: () => sha256Verifier,
22
22
  verifySignature: () => verifySignature
23
23
  });
24
24
  module.exports = __toCommonJS(sha256Verifier_exports);
@@ -67,7 +67,7 @@ const verifySignature = ({
67
67
  );
68
68
  }
69
69
  };
70
- const sha256Verifier = (_options) => {
70
+ function sha256Verifier(_options) {
71
71
  return {
72
72
  sign: ({ payload, secret }) => {
73
73
  return createSignature({ payload, secret });
@@ -77,9 +77,9 @@ const sha256Verifier = (_options) => {
77
77
  },
78
78
  type: "sha256Verifier"
79
79
  };
80
- };
81
- var sha256Verifier_default = sha256Verifier;
80
+ }
82
81
  // Annotate the CommonJS export names for ESM import in node:
83
82
  0 && (module.exports = {
83
+ sha256Verifier,
84
84
  verifySignature
85
85
  });
@@ -6,8 +6,6 @@ export interface SkipVerifier extends WebhookVerifier {
6
6
  * skipVerifier skips webhook signature verification.
7
7
  * Use when there is no signature provided or the webhook is
8
8
  * entirely public.
9
- *
10
9
  */
11
- declare const skipVerifier: (_options?: VerifyOptions) => SkipVerifier;
12
- export default skipVerifier;
10
+ export declare function skipVerifier(_options?: VerifyOptions): SkipVerifier;
13
11
  //# sourceMappingURL=skipVerifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AACD;;;;;GAKG;AACH,QAAA,MAAM,YAAY,GAAI,WAAW,aAAa,KAAG,YAYhD,CAAA;AAED,eAAe,YAAY,CAAA"}
1
+ {"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AAED;;;;GAIG;AACH,wBAAgB,YAAY,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,YAAY,CAYnE"}
@@ -18,10 +18,10 @@ var __copyProps = (to, from, except, desc) => {
18
18
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
19
  var skipVerifier_exports = {};
20
20
  __export(skipVerifier_exports, {
21
- default: () => skipVerifier_default
21
+ skipVerifier: () => skipVerifier
22
22
  });
23
23
  module.exports = __toCommonJS(skipVerifier_exports);
24
- const skipVerifier = (_options) => {
24
+ function skipVerifier(_options) {
25
25
  return {
26
26
  sign: () => {
27
27
  console.warn(`No signature is created for the skipVerifier verifier`);
@@ -33,5 +33,8 @@ const skipVerifier = (_options) => {
33
33
  },
34
34
  type: "skipVerifier"
35
35
  };
36
- };
37
- var skipVerifier_default = skipVerifier;
36
+ }
37
+ // Annotate the CommonJS export names for ESM import in node:
38
+ 0 && (module.exports = {
39
+ skipVerifier
40
+ });
@@ -3,14 +3,12 @@ export interface TimestampSchemeVerifier extends WebhookVerifier {
3
3
  type: 'timestampSchemeVerifier';
4
4
  }
5
5
  /**
6
- *
7
6
  * Timestamp & Scheme Verifier
8
7
  *
9
8
  * Based on Stripe's secure webhook implementation
10
9
  *
11
10
  * @see https://stripe.com/docs/webhooks/signatures
12
- *
13
11
  */
14
- declare const timestampSchemeVerifier: (options?: VerifyOptions) => TimestampSchemeVerifier;
12
+ export declare function timestampSchemeVerifier(options?: VerifyOptions): TimestampSchemeVerifier;
15
13
  export default timestampSchemeVerifier;
16
14
  //# sourceMappingURL=timestampSchemeVerifier.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD;;;;;;;;GAQG;AACH,QAAA,MAAM,uBAAuB,GAC3B,UAAU,aAAa,KACtB,uBAcF,CAAA;AAED,eAAe,uBAAuB,CAAA"}
1
+ {"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD;;;;;;GAMG;AACH,wBAAgB,uBAAuB,CACrC,OAAO,CAAC,EAAE,aAAa,GACtB,uBAAuB,CAczB;AAED,eAAe,uBAAuB,CAAA"}
@@ -18,7 +18,8 @@ var __copyProps = (to, from, except, desc) => {
18
18
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
19
  var timestampSchemeVerifier_exports = {};
20
20
  __export(timestampSchemeVerifier_exports, {
21
- default: () => timestampSchemeVerifier_default
21
+ default: () => timestampSchemeVerifier_default,
22
+ timestampSchemeVerifier: () => timestampSchemeVerifier
22
23
  });
23
24
  module.exports = __toCommonJS(timestampSchemeVerifier_exports);
24
25
  var import_crypto = require("crypto");
@@ -63,7 +64,7 @@ const verifySignature = ({
63
64
  }
64
65
  throw new import_common.WebhookVerificationError();
65
66
  };
66
- const timestampSchemeVerifier = (options) => {
67
+ function timestampSchemeVerifier(options) {
67
68
  return {
68
69
  sign: ({ payload, secret }) => {
69
70
  return createSignature({
@@ -77,5 +78,9 @@ const timestampSchemeVerifier = (options) => {
77
78
  },
78
79
  type: "timestampSchemeVerifier"
79
80
  };
80
- };
81
+ }
81
82
  var timestampSchemeVerifier_default = timestampSchemeVerifier;
83
+ // Annotate the CommonJS export names for ESM import in node:
84
+ 0 && (module.exports = {
85
+ timestampSchemeVerifier
86
+ });
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@cedarjs/api",
3
- "version": "0.15.1-next.0+3484fef03",
3
+ "version": "0.15.1-next.23+0753a9ca2",
4
4
  "repository": {
5
5
  "type": "git",
6
6
  "url": "git+https://github.com/cedarjs/cedar.git",
@@ -64,7 +64,6 @@
64
64
  "main": "./dist/index.js",
65
65
  "types": "./dist/index.d.ts",
66
66
  "bin": {
67
- "cdr": "./dist/cjs/bins/cedar.js",
68
67
  "cedar": "./dist/cjs/bins/cedar.js",
69
68
  "cedarjs": "./dist/cjs/bins/cedar.js",
70
69
  "redwood": "./dist/cjs/bins/redwood.js",
@@ -98,7 +97,7 @@
98
97
  "title-case": "3.0.3"
99
98
  },
100
99
  "devDependencies": {
101
- "@cedarjs/framework-tools": "0.15.1-next.1",
100
+ "@cedarjs/framework-tools": "0.15.1-next.23",
102
101
  "@types/aws-lambda": "8.10.152",
103
102
  "@types/jsonwebtoken": "9.0.10",
104
103
  "@types/memjs": "1",
@@ -129,5 +128,5 @@
129
128
  "publishConfig": {
130
129
  "access": "public"
131
130
  },
132
- "gitHead": "3484fef0346fcb024623ed62d4621600b8a98d4c"
131
+ "gitHead": "0753a9ca25ba21702aed57f7f5e8b49db9957984"
133
132
  }